Throughout the history of man the basic unit of security has been the family. As the need for support increased the family expanded to tribes to villages finally to counties. The core unit for building a Privacy Security Culture still remains the family. Parents need to instill in their children the need to keep private information private.

Start with small tasks. Have them tear the address off mail and magazines and throw them in the shred box. Let them go through the paper recycle box looking for family names, email addresses, telephone numbers, birthdates, Social Security numbers, account numbers, screen names, user IDs, IM user identifiers and any account statements. Make it a game and reward them for how many they find. Please do not let little fingers close to the shredder and keep the shredder unplugged.

Parents also need to protect their own identities since children learn best by example. Get and check your free credit reports from http://www.AnnualCreditReport.com. You can get a free credit report from each of the credit reporting bureaus every 12 months. A strategy would be to get a report from a different company every four months. Lock in a secure filing cabinet or fire safe papers, tax forms, statements, and medical information that contain private information.

Sign up for AlertID. This free service lets you know about crimes near your home. It lets you know about sex offenders near your home.

Also, consider a identity monitoring service that covers the entire family and provides restoration services like Identity Theft Shield.

Start today building a Culture of Security in your family.

Share this:

Like this:

LikeLoading...

Related

About Bruce Demarest

Bruce Demarest is a Identity Theft Protection Specialist. He has designed and taught classes to educate individuals and businesses in identity theft risk management.
The individuals have learned how to continuously monitor their financial identities from credit fraud, plus how to monitor their personal identifying information for unauthorized use.
His business clients have become compliant with the federal & state privacy laws. He has conducted information security audits to identify their potential problems and has designed security policies, programs, and practices to address those problem areas.